{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T22:40:17Z","timestamp":1740264017937,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259992"},{"type":"electronic","value":"9783540320630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427995_32","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T23:27:06Z","timestamp":1279063626000},"page":"381-388","source":"Crossref","is-referenced-by-count":10,"title":["Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content"],"prefix":"10.1007","author":[{"given":"Ozgur","family":"Yilmazel","sequence":"first","affiliation":[]},{"given":"Svetlana","family":"Symonenko","sequence":"additional","affiliation":[]},{"given":"Niranjan","family":"Balasubramanian","sequence":"additional","affiliation":[]},{"given":"Elizabeth D.","family":"Liddy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/978-3-540-25952-7_40","volume-title":"Intelligence and Security Informatics","author":"S. Symonenko","year":"2004","unstructured":"Symonenko, S., Liddy, E.D., Yilmazel, O., DelZoppo, R., Brown, E., Downey, M.: Semantic Analysis for Monitoring Insider Threats. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 492\u2013500. Springer, Heidelberg (2004)"},{"key":"32_CR2","unstructured":"Yilmazel, O., Symonenko, S., Liddy, E.D., Balasubramanian, N.: Improved Document Representation for Classification Tasks For The Intelligence Community. In: AAAI 2005 Spring Symposium (2005) (forthcoming)"},{"key":"32_CR3","unstructured":"DelZoppo, R., Brown, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., Ho, S.M., D\u2019Eredita, M., Natarajan, A.: A Multi-Disciplinary Approach for Countering Insider Threats. In: SKM Workshop (2004)"},{"key":"32_CR4","unstructured":"Anderson, J.: Computer Security Threat Monitoring and Surveillance (1980)"},{"key":"32_CR5","unstructured":"Lawrence, R.H., Bauer, R.K.: AINT misbehaving: A taxonomy of anti-intrusion techniques (2000)"},{"key":"32_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-44853-5_29","volume-title":"Intelligence and Security Informatics","author":"D.V. Sreenath","year":"2003","unstructured":"Sreenath, D.V., Grosky, W.I., Fotouhi, F.: Emergent Semantics from Users\u2019 Browsing Paths. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 355\u2013357. Springer, Heidelberg (2003)"},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-44853-5_7","volume-title":"Intelligence and Security Informatics","author":"J. Burgoon","year":"2003","unstructured":"Burgoon, J., Blair, J., Qin, T., Nunamaker Jr., J.: Detecting Deception Through Linguistic Analysis. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 91\u2013101. Springer, Heidelberg (2003)"},{"key":"32_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/3-540-44853-5_8","volume-title":"Intelligence and Security Informatics","author":"L. Zhou","year":"2003","unstructured":"Zhou, L., Burgoon, J.K., Twitchell, D.P.: A Longitudinal Analysis of Language Behavior of Deception in E-mail. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 102\u2013110. Springer, Heidelberg (2003)"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-540-25952-7_30","volume-title":"Intelligence and Security Informatics","author":"D.P. Twitchell","year":"2004","unstructured":"Twitchell, D.P., Nunamaker Jr., J.F., Burgoon, J.K.: Using Speech Act Profiling for Deception Detection. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol.\u00a03073, pp. 403\u2013410. Springer, Heidelberg (2004)"},{"key":"32_CR10","unstructured":"Heller, K.A., Svore, K.M., Keromytis, A.D., Stolfo, S.J.: One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses. In: DMSEC 2003 (2003)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Yu, H., Zhai, C., Han, J.: Text Classification from Positive and Unlabeled Documents. In: CIKM 2003 (2003)","DOI":"10.1145\/956863.956909"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1162\/15324430260185574","volume":"2","author":"L.M. Manevitz","year":"2002","unstructured":"Manevitz, L.M., Yousef, M.: One-class SVMs for Document Classification. The Journal of Machine Learning Research\u00a02, 139\u2013154 (2002)","journal-title":"The Journal of Machine Learning Research"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Schneider, K.-M.: Learning to Filter Junk E-Mail from Positive and Unlabeled Examples (2004)","DOI":"10.1007\/978-3-540-30211-7_45"},{"key":"32_CR14","unstructured":"Scholkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the Support of a High-Dimensional Distribution (1999)"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Liu, B., Dai, Y., Li, X., Lee, W.S., Yu, P.S.: Building Text Classifiers Using Positive and Unlabeled Examples. In: ICDM 2003 (2003)","DOI":"10.1109\/ICDM.2003.1250918"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Dumais, S., John, P., Heckerman, D., Sahami, M.: Inductive Learning Algorithms and Representations for Text Categorization. In: Seventh International Conference on Information and Knowledge Management (1998)","DOI":"10.1145\/288627.288651"},{"key":"32_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F. Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine Learning in Automated Text Categorization. ACM Computing Surveys\u00a034, 1\u201347 (2002)","journal-title":"ACM Computing Surveys"},{"key":"32_CR18","unstructured":"Liddy, E.D.: Natural Language Processing, 2nd edn. Encyclopedia of Library and Information Science (2003)"},{"key":"32_CR19","unstructured":"Center for Natural Language Processing (CNLP), http:\/\/www.cnlp.org"},{"key":"32_CR20","unstructured":"Center for Nonproliferation Studies (CNS), http:\/\/cns.miis.edu\/"},{"key":"32_CR21","unstructured":"Sundheim, B., Irie, R.: Gazetteer Exploitation for Question Answering: Project Summary (2003)"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Yang, Y., Liu, X.: A Re-Examination of Text Categorization Methods. In: SIGIR 1999 (1999)","DOI":"10.1145\/312624.312647"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Joachims, T.: Learning to Classify Text using Support Vector Machines (2002)","DOI":"10.1007\/978-1-4615-0907-3"},{"key":"32_CR24","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines (2001)"},{"key":"32_CR25","unstructured":"van Rijsbergen, C.J.: Information Retrieval (1979)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427995_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T22:02:45Z","timestamp":1740261765000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427995_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259992","9783540320630"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11427995_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}